Draft Communications Data Bill


Book Description

The Joint Committee finds that draft Bill must be significantly amended to deliver only necessary data that law enforcement needs, and the Home Secretary should not be given carte blanche to order retention of any type of data. Whilst calling for a narrower focus, the Committee recognises that more needs to be done to provide law enforcement and other agencies access to data they cannot currently obtain and so makes a range of constructive proposals to enable the Home Office to present a better Bill to Parliament. There must also be much better consultation with industry, technical experts, civil liberties groups, public authorities and law enforcement bodies before a new Bill is introduced.




Draft Communications Data Bill


Book Description

This publication contains a draft Communications Data Bill and Explanatory notes related to the Government's proposals to update the framework for ensuring the availability of communications data and regulatory regime governing how public authorities obtain this data. Communications data is information about a communication and includes data about a subscriber to a mobile phone or email account, the time, duration, originator and recipient of a communication and the location of a communication device from which a communication is made. Communications data is widely used by the police and other public authorities around the world and has played a vital role in counter-terrorism and serious crime cases, by enabling the police to understand activities, associates and movements of a person suspected of a crime.The Bill itself, is divided into three parts: Part 1: Ensuring or facilitating availability of data; Part 2: Regulatory regime for obtaining data; Part 3: Scrutiny and other provisions. It applies to the whole of the UK.







HC 573 - Investigatory Powers Bill: Technology Issues


Book Description

The draft Investigatory Powers Bill was published by the Government on 4 November 2015. Ministers have been clear that the intention of this Bill is to consolidate and clarify existing legislation on the interception of communications and the acquisition of communications data and to modernise the law in the light of developments in communications technologies, in order to maintain the operational capabilities of law enforcement agencies and the intelligence and security services. Previous attempts to legislate in this area have met with criticisms over the lack of consultation with communications service providers (CSPs) on matters of technical feasibility and cost. In our inquiry we have focused on technological aspects of the draft Bill in order to identify the main technological issues involved and how these might affect the communications businesses that will have to collect data and cooperate with the security authorities. If law enforcement agencies and the intelligence and security services are effectively to combat terrorism and serious crime, they must have the means to keep pace with developments in communications. They will doubtless need to continue to deploy a range of methods for intercepting and acquiring information about communications. The evidence we have received suggests there are still many unanswered questions about how this legislation will work in the fast moving world of technological innovation. It is essential that the integrity and security of legitimate online transactions is maintained if we are to trust in, and benefit from, the opportunities of an increasingly digital economy.




Draft Investigatory Powers Bill


Book Description

Dated November 2015. Print and web pdfs available at https://www.gov.uk/government/publications Web ISBN=9781474125666




Justice and security green paper


Book Description

In safeguarding national security the Government produces and receives sensitive information. This information must be protected appropriately, as failure to do so may compromise investigations, endanger lives and ultimately lessen its ability to keep the country safe. The increased security and intelligence activity of recent years has led to greater scrutiny including in the civil courts, which have heard a growing numbers of cases challenging Government decisions and actions in the national security sphere. Such cases involve information that under current rules cannot be disclosed in a courtroom. The UK justice system is then either unable to pass judgment and cases collapse or are settled without a judge reaching any conclusions. This green paper aims to respond to the challenges of how sensitive information is treated in the full range of civil proceedings. It looks for solutions that improve the current arrangements while upholding the Government's commitment to the rule of law. It also addresses the need for public reassurance that the national security work is robustly scrutinised, and that the scrutinising bodies are credible and effective. The proposals in this consultation are in three broad areas: enhancing procedural fairness, safeguarding material and reform of intelligence oversight.




Privacy vs. Security


Book Description

Securing privacy in the current environment is one of the great challenges of today’s democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today’s attacks on privacy by the simple use of today’s technology, like web services and e-payment technologies and by State-level surveillance activities.




Surveillance Law, Data Retention and Human Rights


Book Description

This book analyses the compatibility of data retention in the UK with the European Convention on Human Rights (ECHR). The increase in the use of modern technology has led to an explosion of generated data and, with that, a greater interest from law enforcement and intelligence agencies. In the early 2000s, data retention laws were introduced into the UK, and across the European Union (EU). This was met by domestic challenges before national courts, until a seminal ruling by the Court of Justice in the European Union (CJEU) ruled that indiscriminate data retention was incompatible with EU law. Since then, however, the CJEU has revised its position and made certain concessions, particularly under the guise of national security. This book focuses on data retention in the UK with the principal aim of examining compatibility with the ECHR. This is explored through a variety of ways including providing an account of democracy and why secret surveillance poses a threat to it, a history of data retention, assessing the seriousness that data retention poses to fundamental rights, the collection of rights that are affected by data retention which are crucial for a functioning democracy, the implications of who can be obligated to retain (and what to retain), the idea that data retention is a form of surveillance and ultimately, with all things considered, whether this is compatible with the ECHR. The work will be an invaluable resource for students, academics, researchers and policy-makers working in the areas of privacy, human rights law and surveillance.




Protecting National Security


Book Description

This book contends that modern concerns surrounding the UK State’s investigation of communications (and, more recently, data), whether at rest or in transit, are in fact nothing new. It evidences how, whether using common law, the Royal Prerogative, or statutes to provide a lawful basis for a state practice traceable to at least 1324, the underlying policy rationale has always been that first publicly articulated in Cromwell’s initial Postage Act 1657, namely the protection of British ‘national security’, broadly construed. It further illustrates how developments in communications technology led to Executive assumptions of relevant investigatory powers, administered in conditions of relative secrecy. In demonstrating the key role played throughout history by communications service providers, the book also charts how the evolution of the UK Intelligence Community, entry into the ‘UKUSA’ communications intelligence-sharing agreement 1946, and intelligence community advocacy all significantly influenced the era of arguably disingenuous statutory governance of communications investigation between 1984 and 2016. The book illustrates how the 2013 ‘Intelligence Shock’ triggered by publication of Edward Snowden’s unauthorized disclosures impelled a transition from Executive secrecy and statutory disingenuousness to a more consultative, candid Executive and a policy of ‘transparent secrecy’, now reflected in the Investigatory Powers Act 2016. What the book ultimately demonstrates is that this latest comprehensive statute, whilst welcome for its candour, represents only the latest manifestation of the British state’s policy of ensuring protection of national security by granting powers enabling investigative access to communications and data, in transit or at rest, irrespective of location.




Handbook of Social Media and the Law


Book Description

Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.